Upcoming CMMC Event! Join Kansas APEX and Kansas IT Professionals in a discussion of compliance with Defense Cybersecurity requirements. CMMC compliance is crucial for companies in the defense supply chain as prime or subcontractors. This virtual discussion will provide valuable insights into the requirements and best practices for achieving compliance.?Kansas IT professionals will include: John Shamasko, Lead CMMC Assessor & Authorizing Official for The CMMC Team Tariq Azmi of Ember Technology JD Zluticky of Essential It Services, Inc. Registration link in comments
关于我们
Ember Technology is a Registered Practitioner Organization (RPO), authorized by the Cyber AB to provide consulting services to government contractors and other companies in preparation for their CMMC assessments. Our Certified CMMC Professional (CCP) and Registered Practitioners (RPs) have the expertise help you to navigate the regulations and processes to prepare, maintain, and improve your regulatory compliance.
- 网站
-
https://www.embertechnology.com/
Ember Technology的外部链接
- 所属行业
- IT 服务与咨询
- 规模
- 11-50 人
- 总部
- Wichita,Kansas
- 类型
- 私人持股
- 创立
- 2018
- 领域
- Information Technology、Healthcare - HIPAA compliance、US Based Operations、DIB、CMMC、NIST和DFARS
地点
-
主要
1815 E Central
US,Kansas,Wichita,67214
Ember Technology员工
动态
-
CMMC Midwest Conference coming up May 1 & 2. Looking forward to it!
Calling all potential sponsors! Be part of the Conference and get your brand and message out to the regional (and beyond!) DIB and CMMC community. TARIQ A. is happy to answer any questions. Please note: not all slots shown below are still available, they are filling up fast!
-
-
Registration is now open! Visit https://lnkd.in/gKVM98tb and check out who is speaking, the workshops, and all the great things planned for the conference this year. Register early for the best deal on tickets!
此处无法显示此内容
在领英 APP 中访问此内容等
-
As we continue the series of "Where do I start my CMMC Compliance?" POAM plays a critical role on your journey to compliance. A solid Plan of Action & Milestones (POAM) is your roadmap to remediation. It's not just a checklist; it's a strategic document that outlines how you'll address vulnerabilities and strengthen your security posture. A well-crafted POAM demonstrates commitment to security and provides a clear path forward. Here are a few tips on building an effective POAM ? Prioritize: After your GAP Assessment prioritize your GAP, understand your vulnerabilities. Don't try to fix everything at once. Focus on the most critical risks first. ?? ?? Define Clear Objectives: For each vulnerability, define specific, measurable, achievable, relevant, and time-bound (SMART) objectives. What exactly needs to be done? By when??Who is responsible? ?? Outline Actionable Steps: Break down each objective into smaller, manageable tasks.?This makes the remediation process less daunting and ensures progress is trackable.?Include details like specific tools, resources, and personnel required. ?? Establish Realistic Timelines: Don’t rush the process.?Set realistic timelines for each task, considering resource constraints and dependencies.?Regularly review and adjust timelines as needed. ???? Assign Responsibilities: Clearly define who is responsible for each task.?This ensures accountability and prevents tasks from falling through the cracks. ?? Track Progress and Document Everything: Use a system to track progress against your milestones.?Document all activities, including remediation steps taken, test results, and any changes to the POAM.?This documentation is crucial for audits and demonstrating compliance. ?? Regularly Review and Update: Your POAM is a living document. Regularly review and update it to reflect changes in the environment, new vulnerabilities discovered, and progress made. Don't let it become stale A well-maintained POAM is a powerful tool for managing cybersecurity risk. It helps you stay organized, prioritize your efforts, and demonstrate your commitment to security and meeting compliances #CMMC #NIST800 #POAM
-
-
As we continue the series on "Where do I start my compliance journey?" Step 3 "Understand the CMMC requirements" Review your contracts, understand what your storing, processing and transferring. After you understand what you have in your environment ? 1. Identified all systems and locations where CUI might reside: This includes servers, workstations, laptops, mobile devices, cloud storage, and any other potential repositories. ?? ?? 2. Categorize the types of CUI: Determine the specific categories of CUI you handle (e.g., personal data, financial data, intellectual property, etc.). ? ?? 3. Assess the sensitivity of each CUI type: Determine the level of risk associated with each type of CUI This should help you understand which level of CMMC applies to your organization. If you have CUI or CTI an organization can proceed with working towards the level-2 requirements DM me if you need assistance or need further clarifications. #CUI #Compliance #CMMC #DFARS
-
-
Something to consider, whether you're bound by CMMC or not.
Cybersecurity & National Security Leader | Speaker | Advisor | Former Director, Cybersecurity & Infrastructure Security Agency
?? What the heck is an "edge device" and why should businesses care about them? ICYMI: Last week, cybersecurity agencies around the world, including the U.S. Cybersecurity and Infrastructure Security Agency, published an important set of guidance around the protection of so-called edge devices: https://lnkd.in/eneqajBz. TLDR: 1. WHAT ARE THEY? An edge device is a piece of hardware that sits at the periphery (or "edge") of a network and serves as a gateway between a local network and the broader internet or cloud infrastructure. They include routers, switches, firewalls, virtual private networks (VPN) gateways, Internet of Things (IoT) devices, internet-facing servers, and internet-facing operational technology (OT) systems. In sum--if you run a network, you likely have a lot of edge devices in your infrastructure. 2. WHY SHOULD YOU CARE ABOUT THEM? Edge devices can enhance operations but they also increase what's known as the attack surface or the number of potential entry points for cyber threats. Moreover, because many of these devices were not built with security as a top priority, attackers--including PRC cyber threat actors--have effectively leveraged them to exploit multiple business sectors: https://lnkd.in/erUed62u. 3. WHAT CAN BUSINESSES DO TO MITIGATE THE RISK OF INSECURE EDGE DEVICES? Check out these great resources here: https://lnkd.in/eneqajBz. 4. IF YOU'RE AN EDGE DEVICE MANUFACTURER, YOU CAN BE PART OF THE SOLUTION by joining the Secure-By-Design Revolution: https://lnkd.in/eF9_Nn5Y.
-
-
Cont... "Where do I start my compliance journey?" Conduct a GAP Analysis: What is a GAP Analysis: A GAP Analysis is a process that helps you assess the difference between your current state and your desired state. It provides a clear roadmap for identifying the gaps in your operations, processes, or strategies, and helps you take action to bridge those gaps Perform a thorough assessment of your current cybersecurity posture. Identify any gaps between your existing practices and the CMMC requirements. This will help you understand where improvements are needed. DM me if you have questions or need clarification #GAPAnalysis #Cybersecurity #CMMC #RiskManagement
-
-
As we continue the series on "Where do I start my compliance journey?" Step 3 "Understand the CMMC requirements" Review your contracts, understand what your storing, processing and transferring. After you understand what you have in your environment ? 1. Identified all systems and locations where CUI might reside: This includes servers, workstations, laptops, mobile devices, cloud storage, and any other potential repositories. ?? ?? 2. Categorize the types of CUI: Determine the specific categories of CUI you handle (e.g., personal data, financial data, intellectual property, etc.). ? ?? 3. Assess the sensitivity of each CUI type: Determine the level of risk associated with each type of CUI This should help you understand which level of CMMC applies to your organization. If you have CUI or CTI an organization can proceed with working towards the level-2 requirements DM me if you need assistance or need further clarifications. #CUI #Compliance #CMMC #DFARS
-
-
"Invaluable lesson learned: Understand CUI in Your Environment" Early in my consulting career, I worked with a DIB client to conduct a GAP Analysis for what was then CMMC Level 3 (CMMC 1.0) now Level 2. We started with the typical client interviews, discussing their RFP processes, the handling of technical information (CTI), and ultimately, the management of Controlled Unclassified Information (CUI). ?? Mid-way through the GAP Analysis, the Quality Assurance (QA) person informed me they also stored CUI within their Enterprise Resource Planning (ERP) system. This was a significant revelation! ?? ?? The positive outcome was that we discovered additional locations where CUI was stored during our assessment. If I hadn't had that conversation, my GAP Analysis, Plan of Action & Milestones (POAM), and implementation strategy would have been inaccurate and incomplete. ?? We successfully identified hidden data stores, understood the risks associated with each stage of the CUI lifecycle within their environment, and were finally able to conduct a meaningful and comprehensive gap analysis. ?? Invaluable lesson learned: Understanding the lifecycle of CUI within an organization is absolutely critical for effective data security. DM me if you have any questions or need further clarification. #CUI #DataSecurity #Cybersecurity #GapAnalysis #DataLifecycle #InformationSecurity"
-